Sciweavers

5056 search results - page 923 / 1012
» Network Coding Theory
Sort
View
146
Voted
SASO
2008
IEEE
15 years 9 months ago
Cells Are Plausible Targets for High-Level Spatial Languages
—High level languages greatly increase the power of a programmer at the cost of programs that consume more s than those written at a lower level of abstraction. This inefficienc...
Jacob Beal, Jonathan Bachrach
115
Voted
HPDC
2007
IEEE
15 years 9 months ago
PeerStripe: a p2p-based large-file storage for desktop grids
In desktop grids the use of off-the-shelf shared components makes the use of dedicated resources economically nonviable and increases the complexity of design of efficient storag...
Chreston Miller, Patrick Butler, Ankur Shah, Ali R...
156
Voted
ICASSP
2007
IEEE
15 years 9 months ago
Eigentongue Feature Extraction for an Ultrasound-Based Silent Speech Interface
The article compares two approaches to the description of ultrasound vocal tract images for application in a “silent speech interface,” one based on tongue contour modeling, a...
Thomas Hueber, Guido Aversano, Gérard Choll...
104
Voted
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 9 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
93
Voted
MSS
2007
IEEE
86views Hardware» more  MSS 2007»
15 years 8 months ago
RAIF: Redundant Array of Independent Filesystems
Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not suppo...
Nikolai Joukov, Arun M. Krishnakumar, Chaitanya Pa...